scholarly journals Systematic testing for resource leaks in Android applications

Author(s):  
Dacong Yan ◽  
Shengqian Yang ◽  
Atanas Rountev
2005 ◽  
Author(s):  
M. Conrad ◽  
I. Fey
Keyword(s):  

2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Najeh Hcini ◽  
Yaovi Kugbe ◽  
Zo Hasina Linah Rafalimanana ◽  
Véronique Lambert ◽  
Meredith Mathieu ◽  
...  

AbstractLittle is known about the long-term neurological development of children diagnosed with congenital Zika infection at birth. Here, we report the imaging and clinical outcomes up to three years of life of a cohort of 129 children exposed to Zika virus in utero. Eighteen of them (14%) had a laboratory confirmed congenital Zika infection at birth. Infected neonates have a higher risk of adverse neonatal and early infantile outcomes (death, structural brain anomalies or neurologic symptoms) than those who tested negative: 8/18 (44%) vs 4/111 (4%), aRR 10.1 [3.5–29.0]. Neurological impairment, neurosensory alterations or delays in motor acquisition are more common in infants with a congenital Zika infection at birth: 6/15 (40%) vs 5/96 (5%), aRR 6.7 [2.2–20.0]. Finally, infected children also have an increased risk of subspecialty referral for suspected neurodevelopmental delay by three years of life: 7/11 (64%) vs 7/51 (14%), aRR 4.4 [1.9–10.1]. Infected infants without structural brain anomalies also appear to have an increased risk, although to a lesser extent, of neurological abnormalities. It seems paramount to offer systematic testing for congenital ZIKV infection in cases of in utero exposure and adapt counseling based on these results.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2208
Author(s):  
Jesús D. Trigo ◽  
Óscar J. Rubio ◽  
Miguel Martínez-Espronceda ◽  
Álvaro Alesanco ◽  
José García ◽  
...  

Mobile devices and social media have been used to create empowering healthcare services. However, privacy and security concerns remain. Furthermore, the integration of interoperability biomedical standards is a strategic feature. Thus, the objective of this paper is to build enhanced healthcare services by merging all these components. Methodologically, the current mobile health telemonitoring architectures and their limitations are described, leading to the identification of new potentialities for a novel architecture. As a result, a standardized, secure/private, social-media-based mobile health architecture has been proposed and discussed. Additionally, a technical proof-of-concept (two Android applications) has been developed by selecting a social media (Twitter), a security envelope (open Pretty Good Privacy (openPGP)), a standard (Health Level 7 (HL7)) and an information-embedding algorithm (modifying the transparency channel, with two versions). The tests performed included a small-scale and a boundary scenario. For the former, two sizes of images were tested; for the latter, the two versions of the embedding algorithm were tested. The results show that the system is fast enough (less than 1 s) for most mHealth telemonitoring services. The architecture provides users with friendly (images shared via social media), straightforward (fast and inexpensive), secure/private and interoperable mHealth services.


2020 ◽  
Vol 10 (23) ◽  
pp. 8351
Author(s):  
Rosangela Casolare ◽  
Fabio Martinelli ◽  
Francesco Mercaldo ◽  
Antonella Santone

The increase in computing capabilities of mobile devices has, in the last few years, made possible a plethora of complex operations performed from smartphones and tablets end users, for instance, from a bank transfer to the full management of home automation. Clearly, in this context, the detection of malicious applications is a critical and challenging task, especially considering that the user is often totally unaware of the behavior of the applications installed on their device. In this paper, we propose a method to detect inter-app communication i.e., a colluding communication between different applications with data support to silently exfiltrate sensitive and private information. We based the proposed method on model checking, by representing Android applications in terms of automata and by proposing a set of logic properties to reduce the number of comparisons and a set of logic properties automatically generated for detecting colluding applications. We evaluated the proposed method on a set of 1092 Android applications, including different colluding attacks, by obtaining an accuracy of 1, showing the effectiveness of the proposed method.


2021 ◽  
Vol 26 (4) ◽  
Author(s):  
Jordan Samhi ◽  
Kevin Allix ◽  
Tegawendé F. Bissyandé ◽  
Jacques Klein

AbstractDue to the convenience of access-on-demand to information and business solutions, mobile apps have become an important asset in the digital world. In the context of the COVID-19 pandemic, app developers have joined the response effort in various ways by releasing apps that target different user bases (e.g., all citizens or journalists), offer different services (e.g., location tracking or diagnostic-aid), provide generic or specialized information, etc. While many apps have raised some concerns by spreading misinformation or even malware, the literature does not yet provide a clear landscape of the different apps that were developed. In this study, we focus on the Android ecosystem and investigate Covid-related Android apps. In a best-effort scenario, we attempt to systematically identify all relevant apps and study their characteristics with the objective to provide a first taxonomy of Covid-related apps, broadening the relevance beyond the implementation of contact tracing. Overall, our study yields a number of empirical insights that contribute to enlarge the knowledge on Covid-related apps: (1) Developer communities contributed rapidly to the COVID-19, with dedicated apps released as early as January 2020; (2) Covid-related apps deliver digital tools to users (e.g., health diaries), serve to broadcast information to users (e.g., spread statistics), and collect data from users (e.g., for tracing); (3) Covid-related apps are less complex than standard apps; (4) they generally do not seem to leak sensitive data; (5) in the majority of cases, Covid-related apps are released by entities with past experience on the market, mostly official government entities or public health organizations.


Sign in / Sign up

Export Citation Format

Share Document